MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4989ad7eb9476407ceeafc41ebcd941610cd205d6c2d75b61d93003a2cfdab32. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Mirai


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4989ad7eb9476407ceeafc41ebcd941610cd205d6c2d75b61d93003a2cfdab32
SHA3-384 hash: 1073847b5686b05858475cb67fed23d39678cf581dfd6249e8c560e17b6b4925d2ef5472851e0bf82a08651f0da4e08c
SHA1 hash: 5845e922e6737795ace5c84d740643551e400c2b
MD5 hash: 7e41db47ebe36f70d6f98307757ea455
humanhash: missouri-eleven-carpet-yankee
File name:wifi
Download: download sample
Signature Mirai
File size:1'158 bytes
First seen:2025-09-22 04:22:00 UTC
Last seen:Never
File type: sh
MIME type:text/plain
ssdeep 12:IbOWDyPOq/hnCBmTo3hebBdfJAKojENI3BihnlRowBhGDn:IRDyPO6OKYebB4KmENIxylRoIhgn
TLSH T1F42141BEE0118C4635098F80E0BE0AB4B60DDDF0535D9B5A2DCE3A3FA3CCD217469656
Magika txt
Reporter abuse_ch
Tags:mirai sh
URLMalware sample (SHA256 hash)SignatureTags
http://109.205.213.5/kvariant.x86840b6640b19efb588d42ea75682bbfebb77f09726b124378c8c7d9d4792d7155 Miraielf mirai ua-wget
http://109.205.213.5/kvariant.spc3645d305a27c23fe1710fc8edfd8145435d1658e574debd298ffd995310879b9 Miraielf mirai ua-wget
http://109.205.213.5/kvariant.sh4b6bebb2a57ed917c822563a91d01ec1e819e8a35ee9692cc650c1ec6fc34e8d8 Miraielf mirai ua-wget
http://109.205.213.5/kvariant.ppc7635eb8f5f9d1a911d5d62b1f5e8e1eb3aac45acfc5c1cdc6e4557948b5b2d97 Miraielf mirai ua-wget
http://109.205.213.5/kvariant.mpsle50556949a508ce964676b0b8c9b075abc11bb649fbfa8849e25de5c6c6c54c0 Miraielf mirai ua-wget
http://109.205.213.5/kvariant.mips2567a20e3f0ef8975cd3858233f0e5dc17c1dfd38c00dad365079532a2628b6b Miraielf mirai ua-wget
http://109.205.213.5/kvariant.m68k69349eab373a345a6b6786cd5c71c8f6bb46d668e8b75175fbd478253ac0c27c Miraielf mirai ua-wget
http://109.205.213.5/kvariant.arm795c84d2cb01247b415f57c19c291ff83f7f2e5da207db1fe775ae6df6f8414fe Miraielf mirai ua-wget
http://109.205.213.5/kvariant.arm6464e01d54829277f90c3a6079e7296056090aff9f57d5b399903470f40628536 Miraielf mirai ua-wget
http://109.205.213.5/kvariant.arm5b348e5b70ab7e0d8bb74afbd7749daaab6d7becf6854dfc75486a71da1430ab9 Miraielf mirai ua-wget
http://109.205.213.5/kvariant.arm376ca979cb4140b86393ee85cf7f66f18f5cee9ad886102ac207238e88562c6a Miraielf mirai ua-wget
http://109.205.213.5/kvariant.arc52e7b401f3aa6fcd260bf175b7984dfb466658ef82dd369bc179af332a414a84 Miraielf mirai ua-wget

Intelligence


File Origin
# of uploads :
1
# of downloads :
44
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
File Type:
text
First seen:
2025-09-22T03:52:00Z UTC
Last seen:
2025-09-22T03:52:00Z UTC
Hits:
~10
Threat name:
Document-HTML.Trojan.Vigorf
Status:
Malicious
First seen:
2025-09-22 05:18:30 UTC
File Type:
Text (JavaScript)
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Mirai

sh 4989ad7eb9476407ceeafc41ebcd941610cd205d6c2d75b61d93003a2cfdab32

(this sample)

  
Delivery method
Distributed via web download

Comments